Intelligent CIO Europe Issue 19 | Page 53

COUNTRY FOCUS: TURKEY of the enterprise and global service provider infrastructures, Cisco embeds security throughout the extended network. Cisco is adding more sensors to increase visibility; more control points to strengthen enforcement; and pervasive, advanced threat protection to reduce time-to- detection and time-to-response, limiting the impact of attacks. Threat Response automates integrations across select Cisco Security products and accelerates key security operations functions: detection, investigation and remediation. It is a key pillar of the integrated security architecture. Why is it so important for IGA to protect the data of its customers and are you confident that this will be protected? With security across the network, Cisco provides scalable threat protection covering the broadest range of attack vectors and throughout the entire attack continuum – before, during and after an attack. The arena for cybercriminals is increasing. In today’s cyberthreat landscape, every organisation, large or small, is at risk of an attack. By integrating security, enterprises and service providers are able to deliver the threat-centric security requirements demanded by today’s dynamic threat landscape and capture emerging business opportunities created by the rise of the Digital Economy and the Internet of Everything (IoE). The Cisco 2018 Security Capability Benchmark Study indicates that 54% of all cyberattacks result in financial damages of more than US$500,000 including, but not limited to, lost revenue, customers, opportunities and out-of-pocket costs. To prevent such losses, we prefer Cisco to protect our customers’ data. Can you explain how the solution has given you better threat hunting capabilities? Cisco enables the organisation’s IP network to be used as a sensor to report anomalies on the network and even undertake automatic cybersecurity actions. This means the IP network can be used as a sensor to detect and eliminate security threats. Cisco CTR is our primary integrations platform which gives us the capability to reduce the time for detection. Cisco www.intelligentcio.com We all know that in the real world there is not a 100% protection system/data but we are confident that we can mitigate 99% of attacks. For the 1%, we focus on endpoint security solutions, awareness, regulations, network visibility and security solutions. How important is it to IGA to protect the endpoints? Cisco Advanced Malware Protection (AMP) for Endpoints prevents threats at point of entry, then continuously tracks every file it allows into your endpoints. AMP can uncover the most advanced threats including file-less malware and ransomware, in hours, not days or months. The data is on the endpoints and malware is always active on the endpoints so for us, endpoint visibility is very important and using Cisco AMP for Endpoints, which is a hybrid of EPP and EDR solution, gives us the capability to protect endpoints. How scalable is the implementation? Cisco’s AMP architecture can be on public cloud or on-premise so the scalability is easy and fast. We have started to sell our MSSP services to our customers from our new company, IGA IT. n INTELLIGENTCIO 53